3.1.6 Implications of computer use

Descripción

Try your best
Dean Wakely
Test por Dean Wakely, actualizado hace más de 1 año
Dean Wakely
Creado por Dean Wakely hace más de 9 años
19
0

Resumen del Recurso

Pregunta 1

Pregunta
Complete the first principle of the Data Protection Act(1998) , Personal Data shall be....
Respuesta
  • processed fairly and lawfully
  • sold to the first person to ask for it
  • dealt on the blackmarket
  • sold on ebay

Pregunta 2

Pregunta
What (under the Computer Misuse act of 1990) is the maximum prison time and fine?
Respuesta
  • Community service
  • Don't care i have money
  • Six Months and/or £5,000
  • 18 Years and/or 99p

Pregunta 3

Pregunta
Who was 'Solo'?
Respuesta
  • Solo, Han Solo
  • Solo was a computer hacker who hacked into the FBI, CIA and The Pentagon.
  • There is not Solo on Zuul

Pregunta 4

Pregunta
Who was ASTRA?
Respuesta
  • Astra phoenix
  • Nobody knows
  • No clue

Pregunta 5

Pregunta
Hacking can cause disruption and cost businesses and individuals a lot of money to deal with
Respuesta
  • True
  • False

Pregunta 6

Pregunta
It's ok to hack into someone's computer
Respuesta
  • True
  • False

Pregunta 7

Pregunta
Some companies employ hackers to test out how secure their system is
Respuesta
  • True
  • False

Pregunta 8

Pregunta
A virus is a piece of software code
Respuesta
  • True
  • False

Pregunta 9

Pregunta
Sending or distibuting viruses knowingly is against the law
Respuesta
  • True
  • False

Pregunta 10

Pregunta
If you are caught hacking or distributing viruses you could go to prison
Respuesta
  • True
  • False

Pregunta 11

Pregunta
It's ok to send harmless viruses that are just for a laugh
Respuesta
  • True
  • False

Pregunta 12

Pregunta
The Computer Misuse Act also makes it illegal to copy software
Respuesta
  • True
  • False

Pregunta 13

Pregunta
The computer misuse act covers people using computers to commit fraud
Respuesta
  • True
  • False

Pregunta 14

Pregunta
A person is guilty of an offence if the access he intends to secure is (select all that apply)
Respuesta
  • unauthorized
  • not granted
  • forced
  • for the bants
  • illegal
  • penetrative
Mostrar resumen completo Ocultar resumen completo

Similar

A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
3.1.2 - Software
AndrewZV
Software
15893
3.1.4 - Hardware
AndrewZV
Computing Hardware - CPU and Memory
ollietablet123